
With the help of advanced technology, the automotive industry is in continuous evolution. Modern vehicles are not only comprised of mechanical components but also contain highly complex electronic devices and connections to the outside world. Today's vehicle usually has between 30 and 70 ECUs (Electronic Control Units), which communicate with each other over standard communication protocols. There are different types of in-vehicle network protocols and bus systems, including the Controlled Area Network (CAN), Local Interconnected Network (LIN), FlexRay, Media Oriented System Transport (MOST), and Automotive Ethernet (AE). Modern cars are also able to communicate with other devices through wired or wireless interfaces such as USB, Bluetooth, Wi-Fi or even 5G. Such interfaces may expose the internal network to the outside world and can be seen as entry points for cyber-attacks. In this paper, the main interest is in the AE network protocol. AE is a special Ethernet design that provides the bandwidth needed for today's applications, and the potential for even greater performance in the future. However, AE is a "best effort" protocol, which cannot be considered reliable. This implies that it is not trustworthy in terms of reliability and timely deliveries. The focus of this paper is to present a state-of-the-art survey of security threats and protection mechanisms relating to AE. After introducing and comparing the different protocols being used in the embedded networks of current vehicles, we analyze the potential threats targeting the AE network and describe how attackers' opportunities can be enhanced by the new communication abilities of modern cars. Finally, we present and compare the AE security solutions currently being devised to address these problems and propose some recommendations and challenges to deal with security issue in AE protocol.
Citation: Aida Ben Chehida Douss, Ryma Abassi, Damien Sauveron. State-of-the-art survey of in-vehicle protocols and automotive Ethernet security and vulnerabilities[J]. Mathematical Biosciences and Engineering, 2023, 20(9): 17057-17095. doi: 10.3934/mbe.2023761
[1] | Claas Hüter, Mingxuan Lin, Diego Schicchi, Martin Hunkel, Ulrich Prahl, Robert Spatschek . A multiscale perspective on the kinetics of solid state transformations with application to bainite formation. AIMS Materials Science, 2015, 2(4): 319-345. doi: 10.3934/matersci.2015.4.319 |
[2] | Aarne Pohjonen . Numerical simulations of gradient cooling technique for controlled production of differential microstructure in steel strip or plate. AIMS Materials Science, 2021, 8(6): 852-866. doi: 10.3934/matersci.2021052 |
[3] | Pavan Hiremath, Gowrishankar M. C., Manjunath Shettar, Sathyashankara Sharma, Jayashree P. K., Suhas Kowshik . Influence of normalizing post carburizing treatment on microstructure, mechanical properties and fracture behavior of low alloy gear steels. AIMS Materials Science, 2021, 8(5): 836-851. doi: 10.3934/matersci.2021051 |
[4] | Utpal K. Dhar, Md. Farabi Rahman, Mustafa Oguzhan Ayanoglu, Ahammad Abdullah . Welding on C67 steel grade sheet: Influence of the parameters and post welding heat treatment. AIMS Materials Science, 2023, 10(3): 453-464. doi: 10.3934/matersci.2023025 |
[5] | Zoubir Chaieb, Ould Mohamed Ouarda, Azzeddine Abderrahmane Raho, Mouhyddine Kadi-Hanifi . Effect of Fe and Si impurities on the precipitation kinetics of the GPB zones in the Al-3wt%Cu-1wt%Mg alloy. AIMS Materials Science, 2016, 3(4): 1443-1455. doi: 10.3934/matersci.2016.4.1443 |
[6] | Toshio Ogawa, Hiroyuki Dannoshita, Yoshitaka Adachi . Evaluation of tensile properties of ferrite single-phase low-carbon steel with different initial microstructures. AIMS Materials Science, 2019, 6(5): 798-805. doi: 10.3934/matersci.2019.5.798 |
[7] | M. P. Lavin-Lopez, L. Sanchez-Silva, J. L. Valverde, A. Romero . CVD-graphene growth on different polycrystalline transition metals. AIMS Materials Science, 2017, 4(1): 194-208. doi: 10.3934/matersci.2017.1.194 |
[8] | Na Ta, Lijun Zhang, Qin Li . Research on the oxidation sequence of Ni-Al-Pt alloy by combining experiments and thermodynamic calculations. AIMS Materials Science, 2024, 11(6): 1083-1095. doi: 10.3934/matersci.2024052 |
[9] | Sabah Senouci, Mouhyddine Kadi-Hanifi, Azzeddine Abderrahmane Raho . Effect of a plastic deformation on the Guinier-Preston zones growth in Al-5at%Ag alloy. AIMS Materials Science, 2017, 4(1): 16-26. doi: 10.3934/matersci.2017.1.16 |
[10] | Jun Wang, Hans Conrad . On the dynamic compared to static grain growth rate in 3 mole% yttria-stabilized tetragonal zirconia polycrystals (3 Y-TZP). AIMS Materials Science, 2016, 3(3): 1208-1221. doi: 10.3934/matersci.2016.3.1208 |
With the help of advanced technology, the automotive industry is in continuous evolution. Modern vehicles are not only comprised of mechanical components but also contain highly complex electronic devices and connections to the outside world. Today's vehicle usually has between 30 and 70 ECUs (Electronic Control Units), which communicate with each other over standard communication protocols. There are different types of in-vehicle network protocols and bus systems, including the Controlled Area Network (CAN), Local Interconnected Network (LIN), FlexRay, Media Oriented System Transport (MOST), and Automotive Ethernet (AE). Modern cars are also able to communicate with other devices through wired or wireless interfaces such as USB, Bluetooth, Wi-Fi or even 5G. Such interfaces may expose the internal network to the outside world and can be seen as entry points for cyber-attacks. In this paper, the main interest is in the AE network protocol. AE is a special Ethernet design that provides the bandwidth needed for today's applications, and the potential for even greater performance in the future. However, AE is a "best effort" protocol, which cannot be considered reliable. This implies that it is not trustworthy in terms of reliability and timely deliveries. The focus of this paper is to present a state-of-the-art survey of security threats and protection mechanisms relating to AE. After introducing and comparing the different protocols being used in the embedded networks of current vehicles, we analyze the potential threats targeting the AE network and describe how attackers' opportunities can be enhanced by the new communication abilities of modern cars. Finally, we present and compare the AE security solutions currently being devised to address these problems and propose some recommendations and challenges to deal with security issue in AE protocol.
Bainitic press hardening is a key production technology for advanced high strength steels, specifically in the automotive industry [1]. Structural parts like A- and B-pillars, roof rails or bumpers are produced based on this method. Currently, it is of specific interest to the industry to take this important technology to the next level in terms of process optimisation. This technique, using a combination of interrupted cooling and quasi-isothermal holding in the bainitic parameter regime, offers highly desirable strength-failure-strain combinations [2]. The possibility to control the process tool temperature offers a vast amount of possible advances in process technology, and work pieces with locally varying thermoelastic properties for a wide range of applications are one of the central goals in this context. A challenge of central importance to the bainitic press hardening process is the understanding of the bainitic transformation.
The mechanism of the bainite transformation is the subject of ongoing debate for decades, see e.g., [3,4,5,6]. The main controversy focuses on the following two arguments: (ⅰ) the nature of the bainitic ferrite/retained austenite interface and its capacity to support the displacive mechanism of bainitic ferrite growth and (ⅱ) the role of carbon transport during the bainite transformation, i.e., whether or not bainitic ferrite is initially supersaturated with carbon and then carbon partitioning takes place from the bainitic ferrite. Within this publication, we will focus on the transport-governed regime, i.e., the transformation is limited by carbon redistribution. The main branches of the scientific discussion about the details of the transport-governed regime can be summarised as follows.
Considerations about the carbon partitioning published in [7,8] suggest that the ferritic component of bainitic microstructures can form with maximal carbon supersaturation, while the escape of carbon from ferrite to austenite after transformation is the essential aspect of the carbon transport. Alternatively, the transport of carbon during diffusional transformation of austenite to ferrite under metastable equilibrium conditions at the interface is also considered (e.g., [5]). An intermediate scenario, where ferrite grows with a partial supersaturation of carbon, with the remaining carbon partitioning into austenite or forming carbides, is described e.g., in [9,10,11]. All of these hypothesises effectively consider the competition between carbon escape and interface migration at high supersaturations, thus the transformation might exhibit a higher velocity than is expected by equilibrium partitioning of carbon. For our investigations, we focus on a regime where the diffusional transport of carbon from the supersaturated austenitic phase at local equilibrium is the rate-limiting mechanism.
The following parts of this publication are organised in four sections; a basic theoretical treatment of solid-solid transitions in the displacive and the diffuse-displacive case is given in Section 2. We also introduce the basics of the boundary integral method, which is used for the investigations on the terminal subunit growth regime.
In Section 3.1, we discuss the influence of coherency stresses and capillarity stresses on the growth of banitic subunits of small radii in the initial growth regime of the diffusional-displacive transition.
In Section 3.2, we present calculations for the specific scenario of bainitic subunit growth frustration, which results form the decreasing temperature during the continuous cooling of the bainitic transformation.
In Section 4, we discuss the context of other related growth regimes also relevant to elastically influenced solid-solid transformations.
The work in this article is based on theoretical work and aims at elementary aspects of growth behaviour in bainitic subunits. As representative geometry, we present Figure 1.
The bainitic transformation is an example for diffusional or mixed diplacive-diffusional solid-solid transitions strongly influenced by elastic effects. An overview of elastical-diffusional transformations can be found e.g., in [12,13,14], in our studies reported in [15,16,17,18,19,20,21,22], we focused on transformations exhibiting coherent interfaces. Though the coupling of displacive and diffusional transitions has been investigated recently also emphasising engineering aspects, see [23], our focus in the course of this publication is on the possible dominance of elastic effects in the initial and terminal regime of subunit growth. When we refer to the terminal growth regime of a bainitic subunit, we consider the freezing-out carbon diffusion upon the continuous decrease of temperature during the progressing bainitic transformation.
Within this manuscript, we focus on two distinct scenarios. First, the initial growth regime of the subunit is considered. The corresponding model is a sharp interface model, which aims at the prediction of the geometric properties of the growing pattern. Second, we investigate the terminal regime of subunit growth, where we apply the boundary integral method. As the main part of the work is associated to the terminal growth regime, we present here the theoretical basics of the boundary integral method in the context of the physical model we assume for the terminal growth regime. As the boundary integral method is especially useful in the study of steady-state moving fronts, we focus on these steady-state scenarios, here, as systematically integrated in the non-isothermal context of the bainitic transformation. The growth predictions obtained from such steady-state scenarios can be interpreted as valid during the persistence time scale which is basically limited by the variation of the governing parameters of the process.
To introduce the boundary integral method, we focus on the diffusional aspect of the transformation. We represent the diffusion equation for a field
L[u]=∇2u+2lD∂∂yu=0, | (1) |
and use the Green's function
GL[u]−uL†[G]=∇ˉJ(u,G) | (2) |
where
For the terminal growth regime, the basis of our considerations is a coupled model of diffusional carbon transport and static elastic misfit stresses within the two adjoining phases, i.e., the parent austenite and the growing ferrite phase, together with the physically necessary boundary conditions at the progressing phase boundary. The diffusional transport is governed by a diffusion equation in the bulk, complemented by the mass conservation condition and the Gibbs-Thompson condition of local phase equilibrium. In total, we obtain the following three equations for the dimensionless carbon concentration field
D∇2u=∂u/∂t,υn=D→nΔ∇u|int,u|int=Δ−dκ+TeqδFel/LmΔc. | (3) |
By
δFel=σ(0)ikϵ(β)ik−E[(ϵ0ττ)2+(ϵ0ss)2+2ν(ϵ0ττ)(ϵ0ss)+2(1−ν)(ϵ0sτ)2]2(1−ν2). | (4) |
Here the indices
The physical picture emerging from these equations is clear. The propagation of the interface releases carbon proportional to the normal component of the growth velocity
The transformation of austenite to bainite involves displacive deformations of the matrix, diffusion controlled growth of bainitic sheaves and the precipitation of carbides inside the ferrite (lower bainite) or inside the austenite (upper bainite). A successful prediction of the transformation kinetics requires consideration of the complex interaction of these processes: elastic/plastic deformation, carbon partitioning and carbide precipitation. The local driving force for the transformation depends sensitively on the carbon concentration, the local misfit-stresses and the temperature. During the transformation, the carbon in the supersaturated bainitic-ferrite can either be released in the surrounding austenite phase or be captured by the embedded carbides, which are competitive for the solute atoms.
When we focus on the very initial regime of the solid solid transformation, involving a nucleus of nanometer size, the size dependence of the elastic parameters in this stage can lead to substantial elastic softening of the growing phase. Furthermore, on this scale, the bulk crystal symmetry structure can be suppressed due to the dominance of interfacial effects on the overall energy of the nucleus. Therefore, we approximate the growing inclusion by concerning only the hydrostatic, isotropic elastic response to stresses from the surrounding bulk phase. The assumption of isotropic elasticity exhibits the lowest expected error on the real elastic behaviour of the nucleus prior any information on the early
We assume that the new phase, which contains N particles and occupies a volume W, is homogeneous with chemical potential
W=Nvα=Nvγ+∫unds | (5) |
where
μ(P)=vα[f0γ+P+ˉσ2rr+ˉσ2ϕϕ−2νˉσrrˉσϕϕ2E+γκ] | (6) |
Here
Following the argumentation in [29] and [12], the radius
h=√ρR | (7) |
ρ=128γ(1−ν2)v2γ9πE(vα−vγ)2 | (8) |
Apparently, these expressions remain valid only when the elastic softening is pronounced and the assumption that neglecting the nonydrostatic aspect of the elastic behaviour in the inclusions is acceptable. However, within the approximative validity of these assumptions, we can consider the onset to be elastically dominated. The crucial point is the absence of any thermal quantities in
Within this section, we focus on the elasto-chemical diffusion-limited growth of a subunit in the terminal regime of carbon transport frustration, i.e., where an effective reduction of the thermodynamic driving force due to the size of the grown subunit can be assumed. The frustration of the carbon transport within the retained austenite is related to the continuous decrease of the overall temperature during the progression of the bainitic transformation. Upon a linear temperature decrease the carbon diffusion coefficient undergoes an exponential decay, as it obeys an Arrhenius-type temperature dependence. The combination of a reduced driving force and an exponentially decreasing diffusion coefficient suggest to study the zero velocity or zero diffusion limit.
To take full advantage of our assumptions, the boundary integral method, as introduced in the methods section, see Eq 3 and in [19], is most suitable. The resulting formulation of the problem combines the governing equations of the elastostatic and transport problem into a closed representation for the unknown boundary,
Δ−dκR+TeqcpδFelL2=pπ∫+∞−∞dx′exp[−p(y(x)−y(x′))]K0(pη(x,x′)). | (9) |
To simplify the representation, we introduce a splitting of the elastic contribution to the local equilibrium into a constant, hysteresis contribution
−σκ+ΔelpΦ[σϵiku(α)ik−Eϵ2B(→x)2(1−υ2)]=−1π∫+∞−∞dx′log[(x−x′)2+(y(x)−y(x′))2(x−x′)2+(−x22+x′22)2]1/2. | (10) |
Here we define
υdD=2π2σ˜Δ4, | (11) |
Rd=πσ˜Δ2. | (12) |
As mentioned, the specific scenario we apply the boundary integral formulation for is a scenario of very slow diffusion, so that the interface propagates slowly. Then, the diffusion is sufficiently low to have the elastic effects dominate the transition. In the case of very small
Therefore, we approximate this frustrated transformation regime via the limit of zero velocity and diffusion. Formally, we can reach the regime of a possibly negligible release of latent heat at the interface when
υR2D=p∼˜Δ2, | (13) |
which shows that for a given radius of the subunit, i.e., if
We introduce a representation of the problem which suits this approach, namely
−dΔelRκ+Φ[σϵiku(α)ik−Eϵ2B(x,x′)2(1−ν2)]=−1πpΔel∫+∞−∞dx′log[(x−x′)2+(y(x)−y(x′))2(x−x′)2+(−x22+x′22)2]1/2. | (14) |
Φ=2(1−ν2)Eϵ2(ˉϵ2yy+ˉϵ2zzˉϵyyˉϵ2zz) |
and the corresponding solvability parameter reads as
dΔelR=σel=1R2γ(1−ν2)Eϵ2(ˉϵ2yy+ˉϵ2zzˉϵyyˉϵ2zz) | (15) |
We note that we have introduced a solvability parameter which describes the growth regime without involving any diffusional transport parameters. This reflects the possible elastic selection on the formal level. We implemented a symmetric diffusion model instead of the one-sided model which is typically used for highly asymmetric carbon transport. Therefore, we note that the dependence of the stability parameter on the control parameter in the symmetric and one-sided model is qualitatively identical. The symmetric model implementation is numerically easier to handle in the regime of
A finite value of
R=dΔelσel∼1 | (16) |
υ=2ΔelσelπDd˜Δ2∼˜Δ2, | (17) |
where we note that the net driving force relative to the elastic hysteresis in our model is assumed to be reduced by the frustration of the transformation. A possible square-root dependence of the solvability parameter on
R∼1˜Δ, | (18) |
υ∼~Δ3. | (19) |
Despite of the inconclusive numerical results for the zero velocity limit concerning a finite
We presented our recent work on the possibilities of elastically dominated regimes in diffusion-limited solid state transformations. Referencing the bainitic transformation, specifically the scenario of sheaf growth via subunit growth into the retained austenite, the very initial and the terminal growth regime are considered. For the early growth regime, we find that under strong assumptions for the elastic softening and effective isotropy of the onsetting phase, the problem can be considered analogous to a crack formation problem. This is in line with previously published investigations on melt inclusion growth published in [29]. When the Mullins-Sekerka instability sets the transition from this early, elastically governed growth regime to the coupled diffusive-displacive growth regime, described in [15,16,18,19], the transport of carbon in the retained austenite is assumed to be the limiting factor of subunit growth. Taking into account the decrease of the carbon diffusion coefficient with decreasing temperature suggests to consider the effect of a reduced diffusion coefficient. In combination with elastically frustrated growth, i.e., reduction of the effective driving force, the reduced diffusion coefficient suggests to study a zero velocity limit. The presented numerical results show the possibility of an elastically dominated terminal growth regime of subunits.
N. T. would like to acknowledge financial support from Innovation Foundation For Postgraduate and Fundamental Research Funds of Central South University (Grant No. 1053320171074), Changsha, China. K. W. would like to acknowledge financial support from Chinese Scholarship Council (Grant No. 201706370221), China. X. Y., M. F. and C. H. acknowledge the support of the Deutsche Forschungsgemeinschaft under Project No. SPP 1713.
All authors declare no conflict of interest in this paper.
[1] |
S. Tariq, S. Y. Lee, H. K. Kim, S. S. Woo, CAN-ADF: The controller area network attack detection framework, Comput. Secur., 94 (2020), 101857. https://doi.org/10.1016/j.cose.2020.101857 doi: 10.1016/j.cose.2020.101857
![]() |
[2] | C. Corbett, E. Schoch, F. Kargl, P. Felix, Automotive Ethernet: Security opportunity or challenge?, 2016 (2016), 45–54. |
[3] | S. Jadhav, D. Kshirsagar, A survey on security in automotive networks, in 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), (2018), 1–6. https://doi.org/10.1109/ICCUBEA.2018.8697772 |
[4] | C. M. Kozierok, C. Correa, R. B. Boatright, J. Quesnelle, Automotive ethernet: The definitive guide, Intrepid Control Syst., 2014 (2014). |
[5] | I. ISO, Road Vehicles—Low-Speed Serial Data Communication—Part 1: General and Definitions, International Organization for Standardization, 1994. |
[6] | I. ISO, Road Vehicles–Controller Area Network (CAN), International Organization for Standardization, 2015. |
[7] |
H. Zhang, X. Meng, X. Zhang, Z. Liu, CANsec A practical in-vehicle controller area network security evaluation tool, Sensors, 20 (2020), 4900. https://doi.org/10.3390/s20174900 doi: 10.3390/s20174900
![]() |
[8] | S. F. Lokman, A. T. Othman, M. H. Abu-Bakar, Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review, J. Wireless Comput. Network, 184 (2019). https://doi.org/10.1186/s13638-019-1484-3 |
[9] | Total Phase, What is CAN bus protocol?, 2019. Available from: https://www.totalphase.com/blog/2019/08/5-advantages-of-can-bus-protocol/. |
[10] | ISO, Road vehicles—Controller Area Network (CAN)—Part 1: Data link layer and physical signaling, International Organization for Standardization, 2015. |
[11] |
H. Qiang, L. Feng, Review of secure communication approaches for in-vehicle network, Int. J. Autom. Technol., 19 (2018), 879–894. https://doi.org/10.1007/s12239-018-0085-1 doi: 10.1007/s12239-018-0085-1
![]() |
[12] | ISO, Road Vehicles Local Interconnect Network (LIN), International Organization for Standardization, 2019. |
[13] | J. M. Ernst, A. J. Michaels, LIN bus security analysis, in IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, (2018), 2085–2090. https://doi.org/10.1109/IECON.2018.8592744 |
[14] |
J. Huang, M. Zhao, Y. Zhou, C. Xing, In-vehicle networking: Protocols, challenges, and solutions, IEEE Network, 33 (2018), 92–98. https://doi.org/10.1109/MNET.2018.1700448 doi: 10.1109/MNET.2018.1700448
![]() |
[15] | E. Hacket, LIN protocol and physical layer requirements, 2018. Available from: https://www.ti.com/lit/an/slla383a/slla383a.pdf?ts = 1668071732342 & ref_url = https%253A%252F%252Fwww.bing.com%252F. |
[16] | ISO, Road Vehicles—FlexRay Communications System, Part 1: General Information and Use Case Definition, International Organization for Standardization, 2013. |
[17] | ISO, Road Vehicles—FlexRay Communications System—Part 5: Electrical Physical Layer Conformance Test Specification, International Organization for Standardization, 2013. |
[18] |
Y. Wang, H. Liu, B. Huang, N. Zhang, Y. Wu, Reliability-based parameter design for FlexRay network in vehicles, Adv. Mech. Eng., 2019 (2019). https://doi.org/10.1177/1687814019839905 doi: 10.1177/1687814019839905
![]() |
[19] | J. Pradeep, S. R. Sebasteen, R. Dineshkrishn, Comparison of CAN and flexray protocol for automotive application, Int. J. Pure Appl. Math., 119 (2018), 1739–1745. |
[20] |
Q. Hu, F. Luo, Review of secure communication approaches for in-vehicle network, Int. J. Autom. Technol., 19 (2018), 879–894. https://doi.org/10.1007/s12239-018-0085-1 doi: 10.1007/s12239-018-0085-1
![]() |
[21] |
L. Pike, J. Sharp, M. Tullsen, P. Hickey, J. Bielman, Secure automotive software: The next steps, IEEE Software, 34 (2017), 49–55. https://doi.org/10.1109/MS.2017.78 doi: 10.1109/MS.2017.78
![]() |
[22] | M. Meier, D. Reinhardt, S. Wendzel, Sicherheit 2016, Lecture Notes in Informatics (LNI), Gesellschaft fur Informatik, Bonn, 2016. |
[23] | ISO, Road vehicles—Media Oriented Systems Transport (MOST)—Part 1: General information and definitions, International Organization for Standardization, 2020. |
[24] | H. Rajeshwari, K. Siddarth, K. S. Gurumurthy, The impact of network topologies on the performance of the in-vehicle network, Int. J. Comput. Theory Eng., 5 (2013). https://doi.org/10.7763/IJCTE.2013.V5.719 |
[25] | K. van Cleave, A survey of automotive ethernet technologies and protocols, in CSE570S: A Survey of Automotive Ethernet Technologies and Protocols, (2019). |
[26] | V. Eramo, F. G. Lavacca, M. Listanti, S. Caporossi, Definition and performance evaluation of an Advanced Avionic TTEthernet Architecture for the support of Launcher Networks, IEEE Aerosp. Electron. Syst. Magaz., 33 (2018). https://doi.org/10.1109/MAES.2018.170161 |
[27] | V. Eramo, F. G. Lavacca, F. Valente, A. Pisculli, S. Caporossi, Simulation and experimental evaluation of a flexible time triggered ethernet architecture applied in satellite Nano/Micro Launchers, Aerospace, 5 (2018). https://doi.org/10.3390/aerospace5030084 |
[28] | V. Eramo, T. Fiori, F. G. Lavacca, F. Valente, A. Baiocchi, S. Ciabuschi, et al., A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks, Comput. Commun., 198 (2023). https://doi.org/10.1016/j.comcom.2022.11.014 |
[29] |
L. Lo Bello, W. Steiner, A perspective on IEEE time-sensitive networking for industrial communication and automation systems, Proceed. IEEE, 107 (2019), 1094–1120. https://doi.org/10.1109/JPROC.2019.2905334 doi: 10.1109/JPROC.2019.2905334
![]() |
[30] |
J. Sanchez-Garrido, B. Aparicio, J. G. Ramírez, R. Rodriguez, M. Melara, L. Cercós, et al., Implementation of a time-sensitive networking (TSN) Ethernet bus for microlaunchers, IEEE Trans. Aerosp. Electron. Syst., 57 (2021), 2743–2758. https://doi.org/10.1109/TAES.2021.3061806 doi: 10.1109/TAES.2021.3061806
![]() |
[31] |
K. A. Mahin, M. Raheeb, O. Seijo, I. Val, H. P. Bernhard, When IEEE 802.11 and 5G meet time-sensitive networking, IEEE Open J. Ind. Electron. Soc., 3 (2022), 14–36. https://doi.org/10.1109/OJIES.2021.3135524 doi: 10.1109/OJIES.2021.3135524
![]() |
[32] | M. Scalas, G. Giacinto, Automotive cybersecurity: Foundations for next-generation vehicles, in 2nd International Conference on new Trends in Computing Sciences (ICTCS), (2019), 1–6. https://doi.org/10.1109/ICTCS.2019.8923077 |
[33] |
L. Pike, J. Sharp, M. Tullsen, P. Hickey, J. Bielman, Secure automotive software: The next steps, IEEE Software, 34 (2017), 49–55. https://doi.org/10.1109/MS.2017.78 doi: 10.1109/MS.2017.78
![]() |
[34] | M. Meier, D. Reinhardt, S. Wendzel, 45, in Sicherheit 2016, Lecture Notes in Informatics (LNI), Gesellschaft fur Informatik, Bonn, 2016. |
[35] | M. Lang, Secure Automotive Ethernet Balancing Security and Safety in Time-Sensitive Systems, Master thesis, Blekinge Institute of Technology, 2019. |
[36] |
T. Kiravuo, M. Sarela, J. Manner, A survey of Ethernet LAN security, IEEE Commun. Surv. Tutorials, 15 (2013), 1477–1491. https://doi.org/10.1109/SURV.2012.121112.00190 doi: 10.1109/SURV.2012.121112.00190
![]() |
[37] | I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaâ niche, Y. Laarouchi, A survey of security threats and protection mechanisms in embedded automotive networks, in 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, (2013). |
[38] | P. Kleberger, T. Olovsson, E. Jonsson, Security aspects of the in-vehicle network in the connected car, in 2011 IEEE Intelligent Vehicles Symposium (IV), (2011), 528–533. |
[39] | N. Khatri, R. Shrestha, S. Y. Nam, Security issues with in-vehicle networks, and enhanced countermeasures based on blockchain, Electronics, 10 (2021), 893. https://doi.org/10.3390/electronics10080893 |
[40] |
H. Yang, M. Liu, Y. Xu, Y. Wu, Y. Xu, Research of automotive ethernet security based on encryption and authentication method, Int. J. Comput. Theory Eng., 11 (2019), 1–5. https://doi.org/10.7763/IJCTE.2019.V11.1230 doi: 10.7763/IJCTE.2019.V11.1230
![]() |
[41] |
J. M. Li, F. Shuo, Y. Wu, Y. Xu, High-efficiency encryption and authentication network security for automotive Ethernet, Int. J. Model. Optim., 12 (2022), 36–42. https://doi.org/10.7763/IJMO.2022.V12.797 doi: 10.7763/IJMO.2022.V12.797
![]() |
[42] |
Y. Zhu, Y. Liu, M. Wu, J. Li, S. Liu, J. Zhao, Research on secure communication on in-vehicle Ethernet based on post-quantum algorithm NTRUEncrypt, Electronics, 11 (2022), 856. https://doi.org/10.3390/electronics11060856 doi: 10.3390/electronics11060856
![]() |
[43] |
B. Ma, S. Yang, Z. Zuo, B. Zou, Y. Cao, X. Yan, et al., An authentication and secure communication scheme for in-vehicle networks based on SOME/IP, Sensors, 22 (2022), 647. https://doi.org/10.3390/s22020647 doi: 10.3390/s22020647
![]() |
[44] | E. Silva, P. F. Araujo-Filho, D. R. Campelo, Experimental evaluation of cryptography overhead in automotive safety-critical communication, in IEEE 87th Vehicular Technology Conference (VTC Spring), (2018), 1–5. https://doi.org/10.1109/VTCSpring.2018.8417610 |
[45] |
W. Wu, R. Li, G. Xie, J. An, Y. Bai, J. Zhou, et al., A survey of intrusion detection for in-vehicle networks, IEEE Trans. Intell. Trans. Syst., 21 (2020), 919–933. https://doi.org/10.1109/TITS.2019.2908074 doi: 10.1109/TITS.2019.2908074
![]() |
[46] |
M. Markovitz, A. Wool, Field classification, modeling and anomaly detection in unknown CAN bus networks, Veh. Commun., 9 (2017), 43–52. https://doi.org/10.1016/j.vehcom.2017.02.005 doi: 10.1016/j.vehcom.2017.02.005
![]() |
[47] | M. Bresch, N. Salman, Design and Implementation of an Intrusion Detection System (IDS) for in-Vehicle Networks, Master Thesis, Chalmers University of Technology and University of Gothenburg, 2017. |
[48] |
M. J. Kang, J. W. Kang, A novel intrusion detection method using deep neural network for in-vehicle network security, PloS One, 11 (2016), e0155781. https://doi.org/10.1371/journal.pone.0155781 doi: 10.1371/journal.pone.0155781
![]() |
[49] | B. Jeon, H. Ju, B. Jung, K. Kim, D. Lee, A study on traffic characteristics for anomaly detection of Ethernet-based IVN, in 2019 International Conference on Information and Communication Technology Convergence (ICTC), (2019), 951–953. https://doi.org/10.1109/ICTC46691.2019.8940022 |
[50] | D. Grimm, M. Weber, E. Sax, An extended hybrid anomaly detection system for automotive electronic control units communicating via Ethernet-efficient and effective analysis using a specification- and machine learning-based approach, in Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport (VEHITS), (2018), 462–473. https://doi.org/10.5220/0006779204620473 |
[51] | M. Weber, S. Klug, E. Sax, B. Zimmer, Embedded hybrid anomaly detection for automotive CAN communication, in 9th European congress on embedded real time software and systems (ERTS 2018), (2018). |
[52] |
S. Jeong, B. Jeonb, B. Chungb, H. Kang Kim, Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based Networks, Veh. Commun., 29 (2021), 100338. https://doi.org/10.1016/j.vehcom.2021.100338 doi: 10.1016/j.vehcom.2021.100338
![]() |
[53] | N. Alkhatib, M. Mushtaq, H. Ghauch, J. L. Danger, AVTPnet: Convolutional autoencoder for AVTP anomaly detection in automotive ethernet networks, preprint, arXiv: 2202.00045. |
[54] | Z. Zihan, C. Lirong, Z. Haitao, Z. Fan, Research on intrusion detection technology based on embedded Ethernet, in 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 587–600. https://doi.org/10.1109/ICCWAMTIP53232.2021.9674069 |
[55] | Autosar, Standards. Available from: https://www.autosar.org/standards/. |
[56] | B. Qiu, K. Chen, K. He, X. Fang, Research on vehicle network intrusion detection technology based on dynamic data set, in IEEE 3rd International Conference on Frontiers Technology of Information and Computer (ICFTIC), 2021 (2021), 386–390. https://doi.org/10.1109/ICFTIC54370.2021.9647072 |
[57] | H. Lindwall, P. Ovhagen, A Concept for an Intrusion Detection System over Automotive Ethernet, Master thesis, Lund University, 2020. |
[58] | J. Holle, S. Shukla, Gatekeeper for in-vehicle network communication, ATZelektronik Worldwide, 13 (2018), 40–43. |
[59] | M. Pesé, K. Schmidt, H. Zweck, Hardware/software co-design of an automotive embedded firewall, 2017-01-1659, SAE Technical Paper. |
[60] | E. Yilmaz, Firewall and IDPS Concept for Automotive Ethernet, Master thesis, Uppsala Universitet, 2019. |
[61] | Y. Genç, M. Habek, N. Aytaş, A. Akkoç, E. Afacan, E. Yazgan, Elliptic curve cryptography for security in connected vehicles, in 2022 30th Signal Processing and Communications Applications Conference (SIU), (2022), 1–4. https://doi.org/10.1109/SIU55565.2022.9864762 |
1. | Mingxuan Lin, Carina Zimmermann, Kai Wang, Martin Hunkel, Ulrich Prahl, Robert Spatschek, Modeling Bainitic Transformations during Press Hardening, 2021, 14, 1996-1944, 654, 10.3390/ma14030654 |